Your message dated Tue, 05 Sep 2023 15:22:14 +0000
with message-id <[email protected]>
and subject line Bug#1007383: fixed in xbindkeys-config 0.1.3-3
has caused the Debian Bug report #1007383,
regarding xbindkeys-config: please consider upgrading to 3.0 source format
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1007383: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007383
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: xbindkeys-config
Version: 0.1.3-2.3
Severity: wishlist
Tags: bookworm sid
Usertags: format1.0 format1.0-nkp-nv

Dear maintainer,

This package is among the few (1.9%) that still use source format 1.0 in
bookworm.  Please upgrade it to source format 3.0, as (1) this format has many
advantages, as documented in https://wiki.debian.org/Projects/DebSrc3.0 ; (2)
this contributes to standardization of packaging practices.

Please note that this is also a sign that the packaging of this software
could maybe benefit from a refresh. It might be a good opportunity to
look at other aspects as well.


This mass bug filing was discussed on debian-devel@:
https://lists.debian.org/debian-devel/2022/03/msg00074.html

Thanks

Lucas

--- End Message ---
--- Begin Message ---
Source: xbindkeys-config
Source-Version: 0.1.3-3
Done: Bastian Germann <[email protected]>

We believe that the bug you reported is fixed in the latest version of
xbindkeys-config, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bastian Germann <[email protected]> (supplier of updated xbindkeys-config package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 05 Sep 2023 14:33:12 +0000
Source: xbindkeys-config
Architecture: source
Version: 0.1.3-3
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group <[email protected]>
Changed-By: Bastian Germann <[email protected]>
Closes: 871375 1007383
Changes:
 xbindkeys-config (0.1.3-3) unstable; urgency=medium
 .
   * QA upload.
   * Convert to source format 3.0. (Closes: #1007383)
 .
   [ Helmut Grohne ]
   * Fix FTCBFS: Use cross toolchain. (Closes: #871375)
Checksums-Sha1:
 4eab96d63441f5f9583194c24e83af73cb6f2b3a 1605 xbindkeys-config_0.1.3-3.dsc
 793ff62dbd6cc56c1c1de473f5b9d92652e4a09c 4656 
xbindkeys-config_0.1.3-3.debian.tar.xz
 17b48a08776aa411c8ae5b240af3e1784b58373d 10619 
xbindkeys-config_0.1.3-3_source.buildinfo
Checksums-Sha256:
 3254704a62ad71cf4b8293ac44adbd4a9aea84f1c236bb7c783b07e6d0915d7c 1605 
xbindkeys-config_0.1.3-3.dsc
 d32e2ee8dcac2239fdfc75538d8acb5e99c5dfd82c0f8743e1dada2405cfed06 4656 
xbindkeys-config_0.1.3-3.debian.tar.xz
 e0ffda1ae2ad8d74fc4f6d8cda7425e80afc5049390cfbe18f9b539f3511bffe 10619 
xbindkeys-config_0.1.3-3_source.buildinfo
Files:
 e32f149dfd8f798d69ad9cd2c0aeed56 1605 x11 optional xbindkeys-config_0.1.3-3.dsc
 f6d1ae359fcc0ceb51900bcf4ad93ef7 4656 x11 optional 
xbindkeys-config_0.1.3-3.debian.tar.xz
 81f445aec610498ab465f51d216444fb 10619 x11 optional 
xbindkeys-config_0.1.3-3_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=ZPj5
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to